Guide To and Protoco/s Storage Area Networks Java - Rmi The Remote Method Invocation Guide
Guide To and Protoco/s Storage Area Networks Java - Rmi The Remote Method Invocation Guide
li
/
this book by providing the (C-like) pseu- cally the cryptographic techniques deployment. Part of the problem is
docode of what essentially happ’ens include DES, 3DES, IDEA, SAFER, purely the syntactical aspect of such
behind the scenes when certain c m-
mands are invoked (we are warned not
t
to expect that the pseudocode is a qne-
to-one reflection of the actual Ci co
Blowfish, CAST-128, RC2, RC4, RC5,
RC6, AES, RSA, Diffie-Hellman, EIGa-
mal, DSS, ECC, digital envelopes, key
protection, and pseudorandom
protocols (performance being the other
one) that allow, for example, SCSI com-
mands to be conveyed via IP. To this
extent, t h e book presents the SCSI
source code, but rather a summariz d
idea of the control flow). That beidg
l+ sequences, as well as certain legal issues.
The reader should be warned that the
Architecture Model (SAM-2), and SCSI
architecture in general ( C h a p t e r 4)
said, understanding the internals boil
down to understanding the pseudocode, P presentation of cryptographic techniques
I .
umentation) to fully exploit its power is in the periphery of RMI proper, but addition of LAN operating systems. A
not widely available. The book by Pitt likely to be encountered when deploy- single chapter describes TCP/IP, from
and McNiff hopes t o fill this gap as ing elaborate or specialized applica- addressing to IP to essentials of routing
well as t o raise b o t h awareness of tions. and transport layer protocols (TCP and
RMI's potential and to link the con- UDP), ending with applications (SMTP,
cepts of distributed programming t o Networks for Computer Scien- FTP, POP3, Telnet, DNS) as well as
corresponding constructs in R M I , dialup data link protocols (SLIP, PPP).
exposing, in the pi-ocess, the internals tists and Engineers What is surprising is the relatively
of RMI and its des,ign. The audience is YGlu Zheng and Shakil Akhtar, 2002, sparse information on HTTP despite a
expected to be reasonably knowledge- Oxford University Press, ISBN 0-19- section devoted to Web applications.
able with Java as well as familiar with 5 1 1398-5, 575 pages, hardcover. The next theme discusses access and
0-0concepts (inheritance and poly- high-speed technologies. This is really a
morphism). In particular, the reader is Among available undergraduate net- chapter on both the last mile, as well as
assumed to be aware of the networking works texts, t h e o n e by Zhcng and on LAN and WAN protocols, namely
classes Socket and Serversocket. The Akhtar follows a particularly interesting ISDN, DSL, SMDS, Frame Relay,
newcomer t o R M I will find the first structure. First, two example applica- FDDI, High Speed Ethernet, FDDI and
nine chapters the most helpful to start tions introduce corresponding architec- CDDI, ATM, SONET, and D W D M .
writing applications. These chapters tures: voice 'communication for The switching and virtual LAN chapter
include, apart from introduction and telephone networks on one hand, client- spans from hubs to LAN switches, intro-
concepts, the semantics of RMI, serial- server applications for packet-switched ducing VLANs and eventually A T M
ization, remote interfaces, the R M I networks on the other. Mechanisms are switches, but lacking in terms of
registry, basic client and server pro- presented to illustrate how such net- describing bridging protocols. Network
gramming, basic security, and tcch- works operate. The examples lead to performance presents analytical (basic
niques/support f o r mobile code more detailed information, such as the queuing), simulation, and network traf-
execution. T h e p r o g r a m m e r m o r e distinction along the lines of topology fic monitoring. The network manage-
familiar with distributed programming and the need for standards. The second ment chapter covers b o t h t h e usual
and elements of RMI finds better use part deals with the principles of data suspects (SNMP and R M O N ) and
for the following three chapters that communications at the level of signals telecommunications management net-
provide detailed information on activa- and modulation but is, oddly, comple- work (TMN). The coverage of cryptog-
tion (essential to provide the illusion of mented by a section on videoconferenc- raphy and security is fairly
persistent reference to an object in a ing (applications and standards). The comprehensive (secret and public key
distributed environment), socket facto- OS1 reference model is next, but once crypto, DES and AES, MD5, PGP, PKI,
ries, and example architectures for more the chapter includes, oddly firewall architectures and types, Ker-
agents programming as an example of enough (since a separate chapter on the heros, VPNs, smart cards, etc.). Con-
the design patterns facilitated by the topic exists), an introduction to network cluding is a chapter o n network
RMI programming paradigm. The last performance. T h e OS1 model is fol- programming, with a typical introduc-
part of the book presents alternatives lowed by LAN technologies (the majori- tion to sockets (and Winsock) program-
and extensions t o the standard R M I ty of which is a description of the IEEE ming plus low-level programming over
implementation (JNDI, naming ser- 802 standards), including hardware serial or parallel ports, as well as basics
vices, Jini, CORBA/IIOP, SSL): topics aspects, with the somewhat misplaced of RPC and Java programming.
The IEEE 802 L.ocal and Metropoli- vide the reader with highlights of IEEE p.nikolich@ieee, IEEE 802 chair.
tan Area Network (LAN/MAN) Stan- 802 activities to enable better dissemina- As a final note, Jim Carlo retired
dards Committee is an international tion of these standards into marketable from the 802 Chair position in Novem-
standards developing organization con- products as well as seek new ideas to be ber 2001. I wish to thank Jim for the ._
sisting of more than 1000 individual net- brought into the IEEE 802 arena. leadership and mentorship he has pro-
working experts located worldwide. The This perspective will provide a brief vided to IEEE 802 since he took over as
major industry standards now in devel- overview of the I E E E 802 standards Chair in 1996.
opment by I E E E 802 a r e E t h e r n e t development process. A Web page Paul Nikolich
(CSMA/CD), Wireless Local Area Net- where additional information can be
works (WLAN), Wireless Personal Area obtained on IEEE 802 activities, meet- Biography
Networks (WPAN), Broadband Wire- ing dates, and organization is located at PAUL NIKOLICH
wos elected to the IEEE802 Chair in
less Access (BWA), Resilient Packet http://www.ieee802.org. November 2001 after serving as IEEE 802 Vice
Ring (RPR), and Bridging/Architecture Subsequent columns will contain Chair since 1996. He has led product, technology,
that provide the basis for enterprise net- highlights of specific standards in devel- and standaids development activities at several
working. There are about 50 IEEE 802 opment. Some of the exciting topics in companies since the early 1980s. Most recently he
LANJMAN standards and five major IEEE 802 are 10 Gigabit Ethernet and was co-founder of Broadband Access Systems, Inc.,
ISO/IEC/JTCl 8802 series equivalent how Ethernet will migrate outward from a supplier of carrier class networking equipment to
standards covering the broad spectrum the enterprise to the first mile, powered cable television system operators. He currently i s on
of LAN/MAN standards. Ethernet, and the growing diversity of independent consultant working closely with YAS
These perspectives have appeared in wireless communication networks. Broadband Ventures, LLC on investing in early stage
some issues of I E E E Network since Please send suggestions, criticisms, and startup companies
September 1997 and are aimed to pro- requests for future article topics t o